Pages

Sunday, 25 May 2014

Alright so you are tired of the boringg wait of system startups ,
omg... what to do.. then follow me if u wanna know how to turn the pc
on in 10 seconds (may vary) Then here is what u have to do to turn ur
pc on in 10 seconds

Start Run

And type Regedit

press enter

this will open Registery Editor

now look for the key

HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\ContentIndex

Now there find the Key Called "Startup Delay"

Double Click On It

Now where its Base Click Decimal

Now its Default Value Is 4800000 (75300:hexadecimal)
Change The Value To 40000

here u go u have done it

now close the Registery Editor and Restart Your Computer

If you think of editing registry as any risk , then you can keep a
backup of the old values so you can immediately restore it whenever
you want

When using the start menu you will notice a delay between different
tiers of the menu hierarchy.So do you want to fast or speed up your
computer in as easy method as you can then you are at the right place
.. Because today i am going to tell you a method by using which you
can speed up your computer without any clean up , tune up or any other
software , Although i recommend this softwares to remove junk files on
computer but this method is totally different from it.

So what you have to do is

1. Start Run

2. Type regedit and press enter.

3. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop
Select MenuShowDelay from the list on the right.

4. Right click on it and select Modify.

5. Change the value to 0.

6. Reboot your computer.

And you are done , you can see the changes that your system is fast
from before , the delay time between the menu options show , refresh
rate all are now very fast.

If you think of editing registry as any risk , then you can keep a
backup of the old values so you can immediately restore it whenever
you want

At the most basic level, passwords are stings of characters, numbers
and symbols. Access to a keyboard or keypad allows entry of these
types of passwords. These passwords range from the simplest – such as
the three digit codes used on some garage door openers – to the more
complicated combinations of characters, numbers and symbols that are
recommended for protecting highly confidential information.

Strings of Characters plus a token

The next level in passwords is to require a string of characters,
numbers and symbols plus a token of some type. An example of this is
the ATM, which requires a card - the token - plus a personal
identification number or PIN. This is considered more secure, because
if you lack either item, you are denied access.

Biometric Passwords

The third level in passwords is the biometric password. This is the
use of non-reproducible biological features, such as fingerprints or
facial features to allow access. An example of this is the retinal
scan, in which the retina – which is the interior surface of the back
of the eye is photographed.

The retina contains a unique pattern of blood vessels that are easily
seen and this pattern is compared to a reference. Biometric passwords
are the most sophisticated and are considered 'safer' but in reality a
password that you 'carry' in your finger or eye is no safer than a
strong password that you carry in your head, provided that the
software that uses the
password is correctly configured.

Here are some suggestions on how to keep your passwords from being cracked:

1. Use strong passwords that cannot be determined by a dictionary attack.

2. Don't post your passwords near your computer.

3.Limit wrong attempts to three tries, then lock the account. The
password must then be reset.

(This does not apply to documents or password protected zip files –
they do not have lock out options.)

4.Change passwords regularly.

5. Use a variety of passwords for different computers. Does this mean
that you need to create a unique password for everything? Absolutely
not. Maintain a master password for things that don't matter . But use
good passwords for anything that actually
needs to be secure.

These are most commonly used output devices used to get prints of
documents on the pager. Different printers have different mechanisms.
Therefore purchasing a printer can be a sometimes confusing task. The
following is additional information that will help in your purchasing
decisions.

Technology of printers

There are many types and technology of printer are available in market
but the most popular and commonly used are inkjet and laser printer.

Ink Jet Printer.

The inkjet printer is not-impact character printer and prints one
character at a time. The printing quality of inkjet printer is
measured by the number of tiny ink of drops per inch(dpi). Most inkjet
printers range from 300 to 2400 dpi. Printers with higher dpi usually
are more expensive but having high printing quality. The speed of an
inkjet printer is measured by the number of pages per minute (ppm) it
can print. Its printing speed is up to 15 ppm. Therefore purchasing a
printer can be depends upon printers dpi and ppm but It depends upon
user need.

Laser Printer.

A Laser printer is the fastest and high quality printer, but a laser
printers are more expensive than inkjet printers and their print
quality is also higher. The print quality and printing speed of laser
printers make them ideal for offices and business. The laser printer
can print text and graphics in very high quality resolution. The
commonly user laser printers have resolution of 300 or 600 dpi and
printing speed is from 5 to 30 ppm. The high quality laser printers
have resolution from 600 to 2400 dpi. The printing speed of these
printers is also more than 150 ppm.

Speed and price range

The price of laser printers depend on the quality and printing speed.
The color printers are more costly than black-and-white laser
printers. The higher the resolution and speed, the more expensive the
printer.The price range can vary depending upon the quality of the
printer and the type of printer for example inkjet, laser printers.

READY TO BUY

Once you have reviewed the appropriate information and believe that
you are ready to make a purchase of a printer ensure that the source
which you plan on purchasing the printer from is a reputable source
and you have reviewed our section on what to look out for when
purchasing over the Internet.

The monitor is a popular and most commonly used output device. Most
monitors used in personal computers to display text, graphics, and
video information. Due to different futures of monitor purchasing can
be one of the most important task. Follow the some given steps to
buying new or used monitor.

Technology of monitor

There are two basic types of monitors that are used with personal computer.

CRT monitors

Flat-Panel Monitors

when you are purchasing a monitor it is important to know, you need a
CRT monitor or a Flat Panel monitor.

CRT Monitors. A CRT monitor is similar to standard television. Like
televisions, CRT monitor size is measured diagonally, in inches,
across the front of the screen. Today, CRT monitors are available in
various sizes, i.e., 15, 17, 19, 21, and 22 inches. The large size
monitors are more expensive and allow you to view more information on
the screen at once.

Flat Panel / LCD. A flat panel monitor is also called LCD monitor. A
flat panel monitor takes up less desk space and also consumes less
power. Flat panel monitors are available with different sizes such as
15, 17, 18, 20, 21, and 23 inches. Flat panel monitors are commonly
used in mobile devices such as laptop and table PCs. Similarly, smart
phones, PDAs calculators have LCD screens.

There are two main categories of LCDs. These are

Active Matrix LCD

Passive Matrix LCD

Resolution

The quality of monitor screen depends on its resolution, which is
generally proportional to the size of screen.

15" monitor typically has a resolution of 800 x 600 / 1,024 x 768

17" monitor typically has a resolution of 1,280 x 1,024

19" monitor typically has a resolution of 1,280 x 1024

21" monitor typically has a resolution of 1,600 x 1,200.

Once you have reviewed the appropriate information and believe that
you are ready to make a purchase of a new monitor, ensure that the
source which you plan on purchasing the monitor from is a reputable
source and you have reviewed our section on what to look out for when
purchasing over the Internet.

CD-ROM drive is used with computer to read the information from the
CD-ROM. Today CD-ROM drives have transfer rates ranging from 48X to
75X or more. Generally Purchasing a CD-ROM drive relatively easy task
however can involve some considerations when purchasing.

Technology of CD-ROM

Before considering purchasing a CD-ROM it is also good consider the
other available options.

CD-R - A CD-writer or recorder (or simply CD-R drive) is used to write
data on CD-R disks. Usually, a CD-writer can read information from CD
as well as write information on CD, The locally produced CD-R disks
are created with CD writer. The speed of these drives is up to 52X or
more.

CD-RW - You must have a CD-RW drive to write date on the CD-RW. These
drives have read and write speed is up to 52X or more but the re-write
speed is 10X or more. The CD-RW drive is advanced and more expensive
than CD-R drive. It can write data on both CD-R and CD-RW discs and
also read data from them

Today CD-ROM drives have transfer rates or speeds ranging from 52X to
72X or more. For Example, a 52X CD-ROM drive has a data transfer rate
of 7,200 KBps (i.e. 48 X 150 = 7200)or 7.2 MBps. It means that the
higher the number, the faster the CD-ROM drive. This speed is
generally only going to be noticeable when installing a program or
copying large amounts of data from a CD.

PRICE RANGE

For a CD-ROM drive, not to be confused with a CD-R, CD-RW or DVD drive
can vary depending upon the speed and the interface the CD-ROM drive
uses.

Server is the most powerful and fastest, and also very expensive
machine. It is used to process large amount of data and to solve the
complicated scientific problems. The severs computers are used in
large organization such as Banks, Airlines and Universities, that it
is a big decision for organization to buy a proper server machine
according to their need Below is information and help for what to look
out for when purchasing a computer server. It is important to also
note that every business is unique and may require more or less of
what is listed below.

NEW vs. USED

Today there are two options to buy a Server computer, a new or used
computer. Used computer are some time out of date, but you can buy it
with very low price as compare to new computer, but I think branded or
used computer are much stable than a new computer. Before purchasing a
Server computer consider if you should purchase a new or used
computer. Many individuals sell computer before they are out of date
allow you to purchase a relatively decent computer. Before purchasing
a new computer from a computer manufacture look at what is available
and review the below precautions when purchasing a computer.

More Considerations

When purchasing a Server computer it is likely that you will have a
general idea of what you may like in the computer or how you would
like to configure the computer. Below is a listing of the various
components likely to be found in a computer and recommendations and
tips when considering any of the following components.

Case

Generally there are two types of Computer Case are available in
market, for Example Tower case and desktop case. The system unit of
the desktop personal computer can lie flat on the desk or table and
the monitor is usually placed on the system unit. An other model of
the computer case is known tower. The system unit of the tower PC is
vertically placed on the desk or table. But purchasing a computer case
is generally not an important consideration when you are going to buy
a Computer. However it depends upon the user needs and choice to
building a computer case may find it important to consider the
following considerations.

CD Media

CD-R -always will be an important consideration to think about when
purchasing a new computer or used computer. A CD-writer or recorder
(or simply CD-R drive) is used to write data on CD-R disks. Usually, a
CD-writer can read information from CD as well as write information on
CD, The locally produced CD-R disks are created with CD writer. The
speed of these drives is up to 52X or more.

CD-RW - You must have a CD-RW drive to write date on the CD-RW. These
drives have read and write speed is up to 52X or more but the re-write
speed is 10X or more. The CD-RW drive is advanced and more expensive
than CD-R drive. It can write data on both CD-R and CD-RW discs and
also read data from them

Hard drives have and always will be an important consideration to
think about when purchasing a new computer or used computer. Hard disk
is most commonly used storage device in personal computers and laptop
computers. Most application programs and operation systems require
hard disk for installation and operation.

Processor

The computer processor is and will always be an important
consideration when purchasing a computer. Processor is considered the
brain of the computer. The CPU fetches instructions of program from
main memory and executes them one by one. The speed of the CPU is
measured in Mega Hertz or Giga Hertz and speed from 500 MHz to 3.4
GHz, it depends upon a user needs, that is why purchasing a processor
is an important consideration when building or buying a computer.
There are several considerations and additional information about what
to ask and look for when purchasing a processor directly or already
installed into a computer.

DVD drives is used with computer to read the information from the
DVD-ROM. Today DVD drives have transfer rates ranging of different
capacity. Buying a DVD drive is confusing task, because there are many
option for this purpose are available in market. Below we have listed
important considerations to look at when considering purchasing a DVD
drive.

Technology of DVD Drives

Before considering purchasing a DVD drives, it is also good consider
the other available options.

CD-R - A CD-writer or recorder (or simply CD-R drive) is used to write
data on CD-R disks. Usually, a CD-writer can read information from CD
as well as write information on CD, The locally produced CD-R disks
are created with CD writer. The speed of these drives is up to 52X or
more.

CD-RW - You must have a CD-RW drive to write date on the CD-RW. These
drives have read and write speed is up to 52X or more but the re-write
speed is 10X or more. The CD-RW drive is advanced and more expensive
than CD-R drive. It can write data on both CD-R and CD-RW discs and
also read data from them

DVD-ROM is an extremely high capacity optical disc with storage
capacity from 4.7 GB to 17 GB. DVD disc is specially use to store
movie films. It is also used to store huge database, music, complex
software etc.

OTHER CONSIDERATIONS

There are some other important considerations to look at when
purchasing a computer DVD drives include:

Processor is considered the brain of the computer. The CPU fetches
instructions of program from main memory and executes them one by one.
The speed of the CPU is measured in Mega Hertz or Giga Hertz and speed
from 500 MHz to 3.4 GHz, it depends upon a user needs, that is why
purchasing a processor is an important consideration when building or
buying a computer. There are several considerations and additional
information about what to ask and look for when purchasing a processor
directly or already installed into a computer.

TYPE

The type of the processor can be very important consideration for
users who are building a computer. The main thing in processor is the
compatibility with the motherboard, Because the processor chip is
plugged into the motherboard. Today there are many processor
manufacturers AMD, Motorola and Intel. Final decision to buy a
processor depends upon user need for example a home or basic user can
buy Intel Celeron or AMD processor. If you can afford then must go for
latest processor if you want your computer to retain functionality for
four to six years. When considering any of the above companies product
ensure that a motherboard that is compatible with that product is also
purchased. For example if an Intel motherboard is purchased or
currently installed into the computer you will want to consider an
Intel Processor.

The motherboard is the main circuit board of the system unit. You can
say that motherboard is the master circuit board in the computer. Many
new user of computer are not well aware about motherboard that is why
for users planning on building a computer a motherboard can be a
confusing decision. Below we have listed some considerations and tips
when looking at purchasing a computer motherboard.

There are many factor of the motherboard is a crucial consideration
when looking at a motherboard.

PC motherboard has two or more expansion slots used to add new
components to the computer. The memory chips are also inserted into
the expansion slot to expand the size of memory. Given option are very
important in any motherboard for example:

Accelerator: It is used to increase the speed of processor.

I/O: It is used to connect input/output devices such as printer, mouse
and keyboard.

Game: It is used to connect joystick.

Disk Controller: It is used to connect disk and CD drives.

Modem: It is used to connect other computers through telephone line or
cable telephone line.

TV Tuner: It is used for viewing television channels on the computer monitor.

The Computer memory plays very important role in data processing.
Computer memory means the computer can use powerful program with large
size. It also improves the data procession speed of computer, that is
way it is very important to verify When purchasing a computer memory,
this memory is suitable for your computer and needs. Below is a
listing of different considerations and tips to look for when
purchasing computer memory.

Type Of Memory

There are many types of memory available in market, Before purchasing
any memory or considering purchasing memory it is important that you
distinguish the type of memory that is required. Below is a listing of
some of the configurations of computer memory.

These are two basic type of monitor that are used with personal
computer, CRT Monitor and Flat-Panel Monitor. Flat Panel is a
relatively new technology when compared to the CRT or standard monitor
technology. Due to new technology some important considerations to
look at when purchasing a flat panel Monitor.

Technology of LCD

There are two categories of LCDs then Before looking at what type of
configurations you need to look for when purchasing a computer Flat
Panel it is important to know if you want Active Matrix LCD or Passive
Matrix LCD.

Look for the best flat panel TV deal so you can buy at discounted prices.

Active Matrix LCD :

Active Matrix LCD uses a transistor for each liquid crystal cell or
pixel and thus displays high quality images. Active Matrix LCD is also
known Thin Film Transistor(TFT) display. Today, new generation of TFT
is called organic LED that displays brighter images than standard TFT
display. The organic LED uses organic molecules to generate output on
the screen.

Passive Matrix LCD :

Passive Matrix LCD uses fewer transistors and requires less power than
active matrix LCD. The colors on Passive Matrix LCD are not bright as
compared to active matrix LCD.

Resolution

The quality of LCD screen depends on its resolution, which is
generally proportional to the size of screen.

*#0606# and then press left soft-key, you will see strange characters,
then text ("brak blokad"). If you see for example 260-02, it means the
phone is locked to Era GSM. In older models you can use *#06# and see
the same information after clicking on left key (you will see IMEI and
software version).

S4:

Monitor Mode - how to activate:

Press left soft-key, then 9 (SET UP) 8 (Phone Status). You will see
IMEI number, then press left soft-key and in order 7684666 and red
phone at the end (monitor mode has been activated). To read
information from Monitor Mode - press left soft-key, then 5 (GSM
SERVICE) and 6 (Monitor). Monitor mode turns off when you switch off
the phone. You must activate it again if you want.

How to see date of software:

Press left soft-key, then 9 (SET UP) 8 (Phone status). You will see
IMEI number, then press twice left soft-key, 98, left soft-key,
7684666, red phone (activates Monitor Mode), left soft-key, 56 (turns
on Monitor Mode), left soft-key, 98, left soft-key, 7684666, hang up
(red phone) >abck to "normal" and then left soft-key, 56.

S6, S8:

If you add to phonebook under 'own phone number' +12022243121 with
namez (for example MMI), then you will see something smile.gif

S10, E10:

In phonebook enter +12022243121 as your own phone no. You will see a
picture with sun, two palms and greetings.

Below we present secret codes of nokia mobile phones which are very
useful for people who unlock phones and for amateurs of this topic.
These special key sequences entered fromkeyboard of phone allow you to
get some important information like IMEI number, release date,
software version and much more. You can also choose default language,
activatenetmonitor ect.

The 54# Tip:
Type 1#, 2#........54# on the keypad (when you're not in the menu) to
get the phone number used for with this key when speed dialing.

Motorola 6200

(Note: pause means the * key held in until box appears)

To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

These countries has been reported working:
UK (Orange)
AU

What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.

To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
IT (model: F16 HW: 5.2 SW: 2.1)

What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.

To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

These countries has been reported working:
ES, AU, NL, BE

What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.

To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

These countries has been reported working:

ES, AU, NL, BE

What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.

To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

These countries has been reported working:

AU, IT, SG, DE, ES, ZA

What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.

1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.
You should now be able to talk without being billed.

Motorola d460

#06# for checking the IMEI (International Mobile Equipment Identity)

Activate RBS

(Note: pause means the * key held in until box appears)

To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.

People don't usually discuss password encryption, because there seems
to be no options to discuss – passwords are, by definition, encrypted.
While this is usually true, encryption is not a simple yes or no
proposition. The effectiveness of encryption, usually described as its
strength, ranges from very weak to extremely robust.
At its weakest, we have passwords that have been simply encoded. This produces a
password that is not readable directly, but, given the key, we could
easily translate it using a computer, pen and paper, or a plastic
decoder ring from a cereal box. An example of this is the ROT13
cypher.

ROT13 replaces every letter in a text with the letter that is 13
places away from it in the alphabet. For example 'ABC' becomes 'NOP'.
Even when using algorithms that can more accurately be called
encryption, the encryption is weak, if the key used to generate it is
weak. Using ROT13 as an example, if you consider the 13 place
differential to be the key, then ROT13 has an extremely weak key.
ROT13 can be strengthened by using a different key. You could use
ROT10, replacing each letter with the one ten places forward, or you
could use ROT-2, replacing each letter with the one two places before
it. You could strengthen it even more, by varying the differential,
such as ROTpi, where the first letter is shifted 3 places; the second,
1 place; the third, 4 places; the fourth, 1 place; and so on, using pi
(3.14159265...) to provide a constantly varying differential.

Because of these possible variations, when you are encrypting any type
of information, you must be sure that you are using a reliable method
of encryption and that the key – your contribution to the encryption –
will provide you with a robust result.
You must also remember that a good system of encryption is useless
without good passwords, just as good passwords are useless without
good encryption.

Password cracking for illegal purposes is illegal. But if it is your
password, then it's your
information. Once you password protect something, and then forget your
password, you are stuck. Hence password recovery.

Password cracking consists of a few basic techniques

"Looking around": passwords are often taped to the bottom of
keyboards, under mousepads, posted on personal bulletin boards.

Brute force: just keep trying passwords until one works
Automated dictionary attacks: these programs run through a series of
possible dictionary
words until one works as a password.

There are many programs available on the web to assist with password recovery on
documents. However, newer versions of programs are becoming more and
more secure, and therefore, more and more difficult to obtain
passwords using the techniques above, or using password recovery
software.

Passwords are keys that control access. They let you in and keep
others out. They provide information control (passwords on documents);
access control (passwords to web pages)
and authentication (proving that you are who you say you are).

Types of Passwords

There are three main types of passwords.

Strings of Characters

At the most basic level, passwords are stings of characters, numbers
and symbols. Access to a keyboard or keypad allows entry of these
types of passwords. These passwords range from the simplest – such as
the three digit codes used on some garage door openers – to the more
complicated combinations of characters, numbers and symbols that are
recommended for
protecting highly confidential information.

Strings of Characters plus a token

The next level in passwords is to require a string of characters,
numbers and symbols plus a token of some type. An example of this is
the ATM, which requires a card - the token - plus a personal
identification number or PIN. This is considered more secure, because
if you lack either item, you are denied access.

Biometric Passwords

The third level in passwords is the biometric password. This is the
use of non-reproducible biological features, such as fingerprints or
facial features to allow access. An example of this is the retinal
scan, in which the retina – which is the interior surface of the back
of the eye – is photographed. The retina contains a unique pattern of
blood vessels that are easily seen and this pattern is compared to a
reference. Biometric passwords are the most sophisticated and are
considered 'safer' but in reality a password that you 'carry' in your
finger or eye is no safer than a strong password that you carry in
your head, provided that the software that uses the password is
correctly configured.

History of Passwords

In older versions of MS Excel and Word, passwords were stored as plain
text in the document header information. View the header and you could
read the password. This is valid for all versions older than Office
2000.

Windows once stored passwords as plain text in a hidden file. Forget
your password? You could just delete the hidden file, and the password
was erased.

Early on, Microsoft and Adobe both used passwords to mean that a file
was password
protected when opened with their applications. If you opened it with
another application,
such as Notepad, the password wasn't necessary.

Microsoft Access 2.0 databases could be opened as a text file easily
by just renaming them
with a ".txt" extension. Doing this allowed you to see the database data.
Adobe PDF files in versions 4.0 and older were printable and often
viewable using Linux PDF readers or Ghostview for Windows.

Wireless networks have a problem with encryption as the key for the
encryption can be
guessed once you collect enough encrypted data out of the air to find
the patterns and
guess the keys. With todays computing power in the normal home, the
key can be cracked almost immediately to find the password.

Bluetooth security is considered very secure, once it is setup. The
problem is that bluetooth transmits a unique, freshly generated,
password between the devices to establish the connection and the
password is sent as plain text. If that password is intercepted, all
future transmissions for that session can be easily decoded.

Build a Strong Password

The best passwords:

? cannot be found in a dictionary

? contain numbers, letters and those odd swear symbols on top of the numbers

? contain upper and lower case letters

? the longer the "stronger"

With a 2 letter password, and 26 letters in the alphabet, plus 10
numbers (ignoring symbols), there are 236 possible combinations
(687,000,000 possibilities). Increase the password length to 8
characters, and there are 836 combinations
(324,000,000,000,000,000,000,000,000,000,000 possibilities).

There are many password generators available on the internet, but
these will generate a
nearly impossible to remember password.

Try instead to use a seemingly random string of letters or numbers
that you can easily recall.

People don't usually discuss password encryption, because there seems
to be no options to discuss – passwords are, by definition, encrypted.
While this is usually true, encryption is not a simple yes or no
proposition. The effectiveness of encryption, usually described as its
strength, ranges from very weak to extremely robust.
At its weakest, we have passwords that have been simply encoded. This
produces a password that is not readable directly, but, given the key,
we could easily translate it using a computer, pen and paper, or a
plastic decoder ring from a cereal box. An example of this is the
ROT13 cypher.

ROT13 replaces every letter in a text with the letter that is 13
places away from it in the alphabet. For example 'ABC' becomes 'NOP'.
Even when using algorithms that can more accurately be called
encryption, the encryption is weak, if the key used to generate it is
weak. Using ROT13 as an example, if you consider the 13 place
differential to be the key, then ROT13 has an extremely weak key.
ROT13 can be strengthened by using a different key. You could use
ROT10, replacing each letter with the one ten places forward, or you
could use ROT-2, replacing each letter with the one two places before
it. You could strengthen it even more, by varying the differential,
such as ROTpi, where the first letter is shifted 3 places; the second,
1 place; the third, 4 places; the fourth, 1 place; and so on, using pi
(3.14159265...) to provide a constantly varying differential.

Because of these possible variations, when you are encrypting any type
of information, you must be sure that you are using a reliable method
of encryption and that the key – your contribution to the encryption –
will provide you with a robust result.
You must also remember that a good system of encryption is useless
without good passwords, just as good passwords are useless without
good encryption.

Password Cracking (Password Recovery)

Password cracking for illegal purposes is illegal. But if it is your
password, then it's your
information. Once you password protect something, and then forget your
password, you are stuck. Hence password recovery.

Password cracking consists of a few basic techniques
"Looking around": passwords are often taped to the bottom of
keyboards, under mousepads, posted on personal bulletin boards.
Brute force: just keep trying passwords until one works
Automated dictionary attacks: these programs run through a series of
possible dictionary
words until one works as a password.
There are many programs available on the web to assist with password recovery on
documents. However, newer versions of programs are becoming more and
more secure, and therefore, more and more difficult to obtain
passwords using the techniques above, or using password recovery
software.

Protection from Password Cracking

Here are some suggestions on how to keep your passwords from being cracked:

1. Use strong passwords that cannot be determined by a dictionary attack.

2. Don't post your passwords near your computer.

3.Limit wrong attempts to three tries, then lock the account. The
password must then be reset.

(This does not apply to documents or password protected zip files –
they do not have lock out
options.)

4.Change passwords regularly.

5. Use a variety of passwords for different computers. Does this mean
that you need to create a unique password for everything? Absolutely
not. Maintain a master password for things that don't matter to you
(perhaps the account you were required to create for TheSIMS.com or
for your account on the local newspaper). But use good passwords for
anything that actually needs to be secure.

Generally there are two types of Computer Case are available in
market, for Example Tower case and desktop case. The system unit of
the desktop personal computer can lie flat on the desk or table and
the monitor is usually placed on the system unit. An other model of
the computer case is known tower. The system unit of the tower PC is
vertically placed on the desk or table. But purchasing a computer case
is generally not an important consideration when you are going to buy
a Computer. However it depends upon the user needs and choice to
building a computer case may find it important to consider the
following considerations.

CONSIDERATIONS

Color of Case

Type of Case (Tower case and Desktop case)

Size of Case

The main and important factor is Upgrade availability in case.

Please must consider that case have enough slots which will allow you
to add additional hard disk CD-ROM, Floppy drives or other drives.

Other main consideration is that case have the availability for slots
for additional cards to be placed in. For Example VGA Card, LAN card
and internal Modem.

You should also see the case for fans slot or space , beacause this is
very important , without this your computer will be ruined , because
it helps in cooling the computer which is the most essential part of a
computer , so dont be lazy while buying computer casses and see all
the specifications and casees very carefully..

Note: This procedure involves editing a game file; create a backup
copy of the file before proceeding. Use a text editor to edit the
"hitman2.ini" file in the game folder. Locate the
"DefaultScene=AllLevels/logos.gms" entry and change it to
"DefaultScene=AllLevels/levelmenu.gms". All levels will be marked as
completed and a level selection menu will be unlocked.

Level skip

Note: This procedure involves editing a game file; create a backup
copy of the file before proceeding. Use a text editor to edit the
"keyboard.cfg" file in the game folder. Locate the following group of
text:

Change the "K_NEXT" text to "K_<key>", where <key> is an uppercase
letter. Begin a game and change to third person view or use the sniper
scope or binoculars. Press that key and the current level will be
marked as completed.

Teleport

Note: This procedure involves editing a game file; create a backup
copy of the file before proceeding. Use a text editor to edit the
"keyboard.cfg" file in the game folder. Locate the following group of
text:

Change the "K_NEXT" text to "K_<key>", where <key> is an uppercase
letter. Begin a game and change to third person view or use the sniper
scope or binoculars. Press that key and 47 will teleport where the
crosshairs are on flat solid ground.

Silenced ballers gun

Successfully complete a level with a "Silent Assassin" rank to unlock
the silenced ballers gun.

Sawed-off shotgun

Successfully complete a level with a "Silent Assassin" rank twice to
unlock the sawed-off shotgun.

M4

Successfully complete five levels with a "Silent Assassin" rank to get
the M4. Alternately, successfully complete the Shogun Showdown level
with a "Silent Assassin" rank. Alternately, successfully complete the
St. Petersburg Stakeout, Tubeway Torpedo, and Invitation to a Party
levels with a "Silent Assassin" rank all in one session.

Gun collection

Throughout all the levels you will run into many different types of
guns. Whenever you see a gun that you do not already have, pick it up.
After you complete the level on which you found the gun, the gun will
now be available at your house. You will have ammunition in the room
for you to use if desired. However, there are many guns that are too
big to carry inside your clothes and therefore must be held in the
open. You will not be able to pick up a gun of the same size or
greater without dropping the one you are holding. You will find other
guns on the same level that you cannot pick up because you are already
holding one, and the gun you want is simply too big to conceal. In
this case, you will have to decide which gun you want more then finish
the level with it. You can always replay that level to get the other
gun that was left behind.

Cheat Codes

Note: This procedure involves editing a game file; create a backup
copy of the file before proceeding. Use a text editor to edit the
"hitman2.ini" file in the game folder. Add the line "EnableCheats 1"
(case-sensitive) to the bottom of the file. Type one of the following
case-sensitive codes while playing the game to activate the
corresponding cheat function:

Note: This procedure involves editing a game file; create a backup
copy of the file before proceeding. Use a text editor to edit the
"hitman2.ini" file in the game folder. Add the line "enableconsole 1"
at the bottom of the file. While playing the game, press ~, then enter
one of the following codes at the console window to activate the
corresponding cheat function:

In older versions of MS Excel and Word, passwords were stored as plain
text in the document header information. View the header and you could
read the password. This is valid for all versions older than Office
2000.

Windows once stored passwords as plain text in a hidden file. Forget
your password? You
could just delete the hidden file, and the password was erased.

Early on, Microsoft and Adobe both used passwords to mean that a file
was password
protected when opened with their applications. If you opened it with
another application,
such as Notepad, the password wasn't necessary.

Microsoft Access 2.0 databases could be opened as a text file easily
by just renaming them
with a ".txt" extension. Doing this allowed you to see the database data.
Adobe PDF files in versions 4.0 and older were printable and often
viewable using Linux PDF readers or Ghostview for Windows.

Wireless networks have a problem with encryption as the key for the
encryption can be
guessed once you collect enough encrypted data out of the air to find
the patterns and
guess the keys. With todays computing power in the normal home, the
key can be cracked almost immediately to find the password.

Bluetooth security is considered very secure, once it is setup. The
problem is that bluetooth transmits a unique, freshly generated,
password between the devices to establish the connection and the
password is sent as plain text. If that password is intercepted, all
future transmissions for that session can be easily decoded.